https://i126.fastpic.org/big/2025/1102/9b/da3b78c5867058f8cff135f16f28979b.jpg
Practical Linux Privilege Escalation (With Ctf Challenges)
Published 8/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 11.70 GB | Duration: 14h 35m

Learn how to Enumerate a Linux System to find and exploit Privilege Escalation attack vectors with hands-on exercises.

What you'll learn

Introduction to the Linux Operating System

Introduction to the Linux Shell

Learn how to enumerate a Linux System

Learn how to perform privilege escalation on a Linux System

Learn the fundamentals of Binary Exploitation in Linux

Requirements

Basic general computer knowledge

Description

The Linux OS plays a foundational role in powering the servers that run the internet of today.- How do you make sure that a Linux deployment is secure?- How do you make sure that it does not contain miss-configurations that could allow a user to escalate privileges and become the administrator (root) user?This course covers the most useful techniques you need to know in order to enumerate a modern Linux OS deployment to find and exploit Privilege Escalation attack vectors.Consider these questions:- Are you interested in working in the security industry?- Do you want to learn how to test the security of a Linux OS deployment?- Do you like hands-on, practice-based learning?If you answered yes to these questions, then this course is for you.In this course I will show you how to test the security of a Linux OS deployment. For each technique covered, I have prepared custom exercises in the form of hands-on CTF challenges that will challenge your understanding and bring it to the next level.Feel free to check out the table of contents in order to understand the arguments covered.Thank you very much, and for any questions, critisim and feedback, you can always write to me.

Overview

Section 1: Introduction

Lecture 1 whoami

Lecture 2 Learning objectives

Lecture 3 Required Knowledge

Lecture 4 How to work with the exercises

Section 2: Introduction to Linux

Lecture 5 What is an Operating System?

Lecture 6 The History of Linux

Lecture 7 Linux Distributions

Lecture 8 Build your own Linux!

Section 3: Introduction to the Linux Shell

Lecture 9 On the Linux Shell

Lecture 10 Linux File System

Lecture 11 Basic Shell Commands

Lecture 12 File System Commands

Lecture 13 Linux File System Permissions

Lecture 14 Linux Permission Commands

Lecture 15 User Management Commands

Lecture 16 Resource Management Commands

Lecture 17 Package Management Commands

Section 4: Offensive Remote Shell Access

Lecture 18 Remote Shell Access

Lecture 19 File Transfer Commands

Lecture 20 Bind Shell

Lecture 21 Reverse Shell

Lecture 22 Upgrade your Reverse Shell

Section 5: Linux Enumeration

Lecture 23 System Enumeration

Lecture 24 Cronjobs Enumeration

Lecture 25 Capabilities Enumeration

Lecture 26 Services Enumeration

Section 6: Linux Privilege Escalation

Lecture 27 PATH Hijacking

Lecture 28 PATH Hijacking Exercises

Lecture 29 SUID Exploitation

Lecture 30 SUID Exploitation Exercises

Lecture 31 SUDO Exploitation

Lecture 32 SUDO Exploitation Exercises

Lecture 33 Wildcard Expansion Exploitation

Lecture 34 Wildcard Expansion Exploitation Exercises

Lecture 35 Password Cracking

Lecture 36 Password Cracking Exercises

Section 7: Linux Binary Exploitation

Lecture 37 Learn how to Debug with GDB

Lecture 38 Calling Conventions in x86 and x86_64

Lecture 39 Stack Frames

Lecture 40 Simple Stack Overflow - 32 bit

Lecture 41 Memory Protection Mechanisms

Lecture 42 Format String Vulnerabilities

Lecture 43 Using Pwntools to Automate Exploitation

Lecture 44 Introduction to Ret2libc

Lecture 45 Ret2libc 32 bit without ASLR Bypass

Lecture 46 Ret2libc 64 bit without ASLR Bypass

Lecture 47 Automate Ret2libc with Pwntools

Lecture 48 Ret2libc 64 bit with ASLR Bypass

Lecture 49 Ret2libc Exercises

Lecture 50 Kernel Exploit - Dirty COW

Section 8: Conclusion

Lecture 51 Next Steps

Cybersecurity enthusiasts curious about Linux Privilege Escalation,Cybersecurity enthusiasts curious about Linux Binary Exploitation,People interested in working in the security industry,People interested about security in general

https://images2.imgbox.com/b3/e8/V5Iw5jsz_o.jpg

NitroFlare

Код:
https://nitroflare.com/view/2838711ABD43791/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part01.rar
https://nitroflare.com/view/E0EBFB34212D3CA/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part02.rar
https://nitroflare.com/view/BF5E77D4996A74A/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part03.rar
https://nitroflare.com/view/5D1C7A7AC22A534/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part04.rar
https://nitroflare.com/view/81243C98D89A640/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part05.rar
https://nitroflare.com/view/ECD1D6B51CA7C3C/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part06.rar
https://nitroflare.com/view/C0B3F6E6D35D1F1/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part07.rar
https://nitroflare.com/view/119E018749A0F2A/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part08.rar
https://nitroflare.com/view/281025F824D1374/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part09.rar
https://nitroflare.com/view/DB55DA76827DF49/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part10.rar

DDownload

Код:
https://ddownload.com/zko0u0223df5/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part01.rar
https://ddownload.com/h1jiz54i8vcn/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part02.rar
https://ddownload.com/lm1q1ug5q8xu/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part03.rar
https://ddownload.com/0sp54uctqfei/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part04.rar
https://ddownload.com/88qu3nb6ql7r/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part05.rar
https://ddownload.com/okoqfh36jhfq/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part06.rar
https://ddownload.com/lcjx018apmmi/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part07.rar
https://ddownload.com/kxmat5z765x8/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part08.rar
https://ddownload.com/izpaq7pbx0qn/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part09.rar
https://ddownload.com/ztw7ni98px7p/yxusj.Udemy.-.Practical.Linux.Privilege.Escalation.with.CTF.challenges.part10.rar